Drop 0001-net-create-skb_gso_validate_mac_len.patch and
0002-bnx2x-disable-GSO-where-gso_size-is-too-big-for-hard.patch
as they were included in 4.9.159.
Change-Id: I904491db574486280bd6cb9d6ea6420ffd8a420b
Reviewed-on: http://photon-jenkins.eng.vmware.com:8082/6872
Tested-by: gerrit-photon <photon-checkins@vmware.com>
Reviewed-by: Bo Gan <ganb@vmware.com>
| ... | ... |
@@ -1,6 +1,6 @@ |
| 1 | 1 |
Summary: Linux API header files |
| 2 | 2 |
Name: linux-api-headers |
| 3 |
-Version: 4.9.154 |
|
| 3 |
+Version: 4.9.163 |
|
| 4 | 4 |
Release: 1%{?dist}
|
| 5 | 5 |
License: GPLv2 |
| 6 | 6 |
URL: http://www.kernel.org/ |
| ... | ... |
@@ -8,7 +8,7 @@ Group: System Environment/Kernel |
| 8 | 8 |
Vendor: VMware, Inc. |
| 9 | 9 |
Distribution: Photon |
| 10 | 10 |
Source0: http://www.kernel.org/pub/linux/kernel/v4.x/linux-%{version}.tar.xz
|
| 11 |
-%define sha1 linux=1a506bd238df9dbdc81e6b74abc0bb751a45eb5b |
|
| 11 |
+%define sha1 linux=8c716f0109f819a1e361853631ff885994c6b1d9 |
|
| 12 | 12 |
BuildArch: noarch |
| 13 | 13 |
Patch0: Implement-the-f-xattrat-family-of-functions.patch |
| 14 | 14 |
%description |
| ... | ... |
@@ -27,6 +27,8 @@ find /%{buildroot}%{_includedir} \( -name .install -o -name ..install.cmd \) -de
|
| 27 | 27 |
%defattr(-,root,root) |
| 28 | 28 |
%{_includedir}/*
|
| 29 | 29 |
%changelog |
| 30 |
+* Thu Mar 14 2019 Srivatsa S. Bhat (VMware) <srivatsa@csail.mit.edu> 4.9.163-1 |
|
| 31 |
+- Update to version 4.9.163 |
|
| 30 | 32 |
* Mon Feb 04 2019 Ajay Kaher <akaher@vmware.com> 4.9.154-1 |
| 31 | 33 |
- Update to version 4.9.154 |
| 32 | 34 |
* Mon Nov 26 2018 Srivatsa S. Bhat (VMware) <srivatsa@csail.mit.edu> 4.9.140-1 |
| 33 | 35 |
deleted file mode 100644 |
| ... | ... |
@@ -1,172 +0,0 @@ |
| 1 |
-From 2b16f048729bf35e6c28a40cbfad07239f9dcd90 Mon Sep 17 00:00:00 2001 |
|
| 2 |
-From: Daniel Axtens <dja@axtens.net> |
|
| 3 |
-Date: Wed, 31 Jan 2018 14:15:33 +1100 |
|
| 4 |
-Subject: [PATCH] net: create skb_gso_validate_mac_len() |
|
| 5 |
- |
|
| 6 |
-If you take a GSO skb, and split it into packets, will the MAC |
|
| 7 |
-length (L2 + L3 + L4 headers + payload) of those packets be small |
|
| 8 |
-enough to fit within a given length? |
|
| 9 |
- |
|
| 10 |
-Move skb_gso_mac_seglen() to skbuff.h with other related functions |
|
| 11 |
-like skb_gso_network_seglen() so we can use it, and then create |
|
| 12 |
-skb_gso_validate_mac_len to do the full calculation. |
|
| 13 |
- |
|
| 14 |
-Signed-off-by: Daniel Axtens <dja@axtens.net> |
|
| 15 |
-Signed-off-by: David S. Miller <davem@davemloft.net> |
|
| 16 |
-Signed-off-by: Srivatsa S. Bhat <srivatsa@csail.mit.edu> |
|
| 17 |
- include/linux/skbuff.h | 16 +++++++++++++ |
|
| 18 |
- net/core/skbuff.c | 63 +++++++++++++++++++++++++++++++++++++++----------- |
|
| 19 |
- net/sched/sch_tbf.c | 10 -------- |
|
| 20 |
- 3 files changed, 66 insertions(+), 23 deletions(-) |
|
| 21 |
- |
|
| 22 |
-diff --git a/include/linux/skbuff.h b/include/linux/skbuff.h |
|
| 23 |
-index 1b3a2f9..5d34da2 100644 |
|
| 24 |
-+++ b/include/linux/skbuff.h |
|
| 25 |
-@@ -3077,6 +3077,7 @@ int skb_shift(struct sk_buff *tgt, struct sk_buff *skb, int shiftlen); |
|
| 26 |
- void skb_scrub_packet(struct sk_buff *skb, bool xnet); |
|
| 27 |
- unsigned int skb_gso_transport_seglen(const struct sk_buff *skb); |
|
| 28 |
- bool skb_gso_validate_mtu(const struct sk_buff *skb, unsigned int mtu); |
|
| 29 |
-+bool skb_gso_validate_mac_len(const struct sk_buff *skb, unsigned int len); |
|
| 30 |
- struct sk_buff *skb_segment(struct sk_buff *skb, netdev_features_t features); |
|
| 31 |
- struct sk_buff *skb_vlan_untag(struct sk_buff *skb); |
|
| 32 |
- int skb_ensure_writable(struct sk_buff *skb, int write_len); |
|
| 33 |
-@@ -3855,6 +3856,21 @@ static inline unsigned int skb_gso_network_seglen(const struct sk_buff *skb) |
|
| 34 |
- return hdr_len + skb_gso_transport_seglen(skb); |
|
| 35 |
- } |
|
| 36 |
- |
|
| 37 |
-+/** |
|
| 38 |
-+ * skb_gso_mac_seglen - Return length of individual segments of a gso packet |
|
| 39 |
-+ * |
|
| 40 |
-+ * @skb: GSO skb |
|
| 41 |
-+ * |
|
| 42 |
-+ * skb_gso_mac_seglen is used to determine the real size of the |
|
| 43 |
-+ * individual segments, including MAC/L2, Layer3 (IP, IPv6) and L4 |
|
| 44 |
-+ * headers (TCP/UDP). |
|
| 45 |
-+ */ |
|
| 46 |
-+static inline unsigned int skb_gso_mac_seglen(const struct sk_buff *skb) |
|
| 47 |
-+{
|
|
| 48 |
-+ unsigned int hdr_len = skb_transport_header(skb) - skb_mac_header(skb); |
|
| 49 |
-+ return hdr_len + skb_gso_transport_seglen(skb); |
|
| 50 |
-+} |
|
| 51 |
-+ |
|
| 52 |
- /* Local Checksum Offload. |
|
| 53 |
- * Compute outer checksum based on the assumption that the |
|
| 54 |
- * inner checksum will be offloaded later. |
|
| 55 |
-diff --git a/net/core/skbuff.c b/net/core/skbuff.c |
|
| 56 |
-index 9f697b0..5945bf4 100644 |
|
| 57 |
-+++ b/net/core/skbuff.c |
|
| 58 |
-@@ -4442,37 +4442,74 @@ unsigned int skb_gso_transport_seglen(const struct sk_buff *skb) |
|
| 59 |
- EXPORT_SYMBOL_GPL(skb_gso_transport_seglen); |
|
| 60 |
- |
|
| 61 |
- /** |
|
| 62 |
-- * skb_gso_validate_mtu - Return in case such skb fits a given MTU |
|
| 63 |
-+ * skb_gso_size_check - check the skb size, considering GSO_BY_FRAGS |
|
| 64 |
- * |
|
| 65 |
-- * @skb: GSO skb |
|
| 66 |
-- * @mtu: MTU to validate against |
|
| 67 |
-+ * There are a couple of instances where we have a GSO skb, and we |
|
| 68 |
-+ * want to determine what size it would be after it is segmented. |
|
| 69 |
- * |
|
| 70 |
-- * skb_gso_validate_mtu validates if a given skb will fit a wanted MTU |
|
| 71 |
-- * once split. |
|
| 72 |
-+ * We might want to check: |
|
| 73 |
-+ * - L3+L4+payload size (e.g. IP forwarding) |
|
| 74 |
-+ * - L2+L3+L4+payload size (e.g. sanity check before passing to driver) |
|
| 75 |
-+ * |
|
| 76 |
-+ * This is a helper to do that correctly considering GSO_BY_FRAGS. |
|
| 77 |
-+ * |
|
| 78 |
-+ * @seg_len: The segmented length (from skb_gso_*_seglen). In the |
|
| 79 |
-+ * GSO_BY_FRAGS case this will be [header sizes + GSO_BY_FRAGS]. |
|
| 80 |
-+ * |
|
| 81 |
-+ * @max_len: The maximum permissible length. |
|
| 82 |
-+ * |
|
| 83 |
-+ * Returns true if the segmented length <= max length. |
|
| 84 |
- */ |
|
| 85 |
--bool skb_gso_validate_mtu(const struct sk_buff *skb, unsigned int mtu) |
|
| 86 |
--{
|
|
| 87 |
-+static inline bool skb_gso_size_check(const struct sk_buff *skb, |
|
| 88 |
-+ unsigned int seg_len, |
|
| 89 |
-+ unsigned int max_len) {
|
|
| 90 |
- const struct skb_shared_info *shinfo = skb_shinfo(skb); |
|
| 91 |
- const struct sk_buff *iter; |
|
| 92 |
-- unsigned int hlen; |
|
| 93 |
-- |
|
| 94 |
-- hlen = skb_gso_network_seglen(skb); |
|
| 95 |
- |
|
| 96 |
- if (shinfo->gso_size != GSO_BY_FRAGS) |
|
| 97 |
-- return hlen <= mtu; |
|
| 98 |
-+ return seg_len <= max_len; |
|
| 99 |
- |
|
| 100 |
- /* Undo this so we can re-use header sizes */ |
|
| 101 |
-- hlen -= GSO_BY_FRAGS; |
|
| 102 |
-+ seg_len -= GSO_BY_FRAGS; |
|
| 103 |
- |
|
| 104 |
- skb_walk_frags(skb, iter) {
|
|
| 105 |
-- if (hlen + skb_headlen(iter) > mtu) |
|
| 106 |
-+ if (seg_len + skb_headlen(iter) > max_len) |
|
| 107 |
- return false; |
|
| 108 |
- } |
|
| 109 |
- |
|
| 110 |
- return true; |
|
| 111 |
- } |
|
| 112 |
-+ |
|
| 113 |
-+/** |
|
| 114 |
-+ * skb_gso_validate_mtu - Return in case such skb fits a given MTU |
|
| 115 |
-+ * |
|
| 116 |
-+ * @skb: GSO skb |
|
| 117 |
-+ * @mtu: MTU to validate against |
|
| 118 |
-+ * |
|
| 119 |
-+ * skb_gso_validate_mtu validates if a given skb will fit a wanted MTU |
|
| 120 |
-+ * once split. |
|
| 121 |
-+ */ |
|
| 122 |
-+bool skb_gso_validate_mtu(const struct sk_buff *skb, unsigned int mtu) |
|
| 123 |
-+{
|
|
| 124 |
-+ return skb_gso_size_check(skb, skb_gso_network_seglen(skb), mtu); |
|
| 125 |
-+} |
|
| 126 |
- EXPORT_SYMBOL_GPL(skb_gso_validate_mtu); |
|
| 127 |
- |
|
| 128 |
-+/** |
|
| 129 |
-+ * skb_gso_validate_mac_len - Will a split GSO skb fit in a given length? |
|
| 130 |
-+ * |
|
| 131 |
-+ * @skb: GSO skb |
|
| 132 |
-+ * @len: length to validate against |
|
| 133 |
-+ * |
|
| 134 |
-+ * skb_gso_validate_mac_len validates if a given skb will fit a wanted |
|
| 135 |
-+ * length once split, including L2, L3 and L4 headers and the payload. |
|
| 136 |
-+ */ |
|
| 137 |
-+bool skb_gso_validate_mac_len(const struct sk_buff *skb, unsigned int len) |
|
| 138 |
-+{
|
|
| 139 |
-+ return skb_gso_size_check(skb, skb_gso_mac_seglen(skb), len); |
|
| 140 |
-+} |
|
| 141 |
-+EXPORT_SYMBOL_GPL(skb_gso_validate_mac_len); |
|
| 142 |
-+ |
|
| 143 |
- static struct sk_buff *skb_reorder_vlan_header(struct sk_buff *skb) |
|
| 144 |
- {
|
|
| 145 |
- int mac_len; |
|
| 146 |
-diff --git a/net/sched/sch_tbf.c b/net/sched/sch_tbf.c |
|
| 147 |
-index 303355c..ad60a45 100644 |
|
| 148 |
-+++ b/net/sched/sch_tbf.c |
|
| 149 |
-@@ -142,16 +142,6 @@ static u64 psched_ns_t2l(const struct psched_ratecfg *r, |
|
| 150 |
- return len; |
|
| 151 |
- } |
|
| 152 |
- |
|
| 153 |
--/* |
|
| 154 |
-- * Return length of individual segments of a gso packet, |
|
| 155 |
-- * including all headers (MAC, IP, TCP/UDP) |
|
| 156 |
-- */ |
|
| 157 |
--static unsigned int skb_gso_mac_seglen(const struct sk_buff *skb) |
|
| 158 |
--{
|
|
| 159 |
-- unsigned int hdr_len = skb_transport_header(skb) - skb_mac_header(skb); |
|
| 160 |
-- return hdr_len + skb_gso_transport_seglen(skb); |
|
| 161 |
--} |
|
| 162 |
-- |
|
| 163 |
- /* GSO packet is too big, segment it so that tbf can transmit |
|
| 164 |
- * each segment in time |
|
| 165 |
- */ |
|
| 166 |
-2.7.4 |
|
| 167 |
- |
| 168 | 1 |
deleted file mode 100644 |
| ... | ... |
@@ -1,58 +0,0 @@ |
| 1 |
-From 8914a595110a6eca69a5e275b323f5d09e18f4f9 Mon Sep 17 00:00:00 2001 |
|
| 2 |
-From: Daniel Axtens <dja@axtens.net> |
|
| 3 |
-Date: Wed, 31 Jan 2018 14:15:34 +1100 |
|
| 4 |
-Subject: [PATCH] bnx2x: disable GSO where gso_size is too big for hardware |
|
| 5 |
- |
|
| 6 |
-If a bnx2x card is passed a GSO packet with a gso_size larger than |
|
| 7 |
-~9700 bytes, it will cause a firmware error that will bring the card |
|
| 8 |
-down: |
|
| 9 |
- |
|
| 10 |
-bnx2x: [bnx2x_attn_int_deasserted3:4323(enP24p1s0f0)]MC assert! |
|
| 11 |
-bnx2x: [bnx2x_mc_assert:720(enP24p1s0f0)]XSTORM_ASSERT_LIST_INDEX 0x2 |
|
| 12 |
-bnx2x: [bnx2x_mc_assert:736(enP24p1s0f0)]XSTORM_ASSERT_INDEX 0x0 = 0x00000000 0x25e43e47 0x00463e01 0x00010052 |
|
| 13 |
-bnx2x: [bnx2x_mc_assert:750(enP24p1s0f0)]Chip Revision: everest3, FW Version: 7_13_1 |
|
| 14 |
-... (dump of values continues) ... |
|
| 15 |
- |
|
| 16 |
-Detect when the mac length of a GSO packet is greater than the maximum |
|
| 17 |
-packet size (9700 bytes) and disable GSO. |
|
| 18 |
- |
|
| 19 |
-Signed-off-by: Daniel Axtens <dja@axtens.net> |
|
| 20 |
-Reviewed-by: Eric Dumazet <edumazet@google.com> |
|
| 21 |
-Signed-off-by: David S. Miller <davem@davemloft.net> |
|
| 22 |
-Signed-off-by: Srivatsa S. Bhat <srivatsa@csail.mit.edu> |
|
| 23 |
- drivers/net/ethernet/broadcom/bnx2x/bnx2x_main.c | 18 ++++++++++++++++++ |
|
| 24 |
- 1 file changed, 18 insertions(+) |
|
| 25 |
- |
|
| 26 |
-diff --git a/drivers/net/ethernet/broadcom/bnx2x/bnx2x_main.c b/drivers/net/ethernet/broadcom/bnx2x/bnx2x_main.c |
|
| 27 |
-index 554c408..72d90b2 100644 |
|
| 28 |
-+++ b/drivers/net/ethernet/broadcom/bnx2x/bnx2x_main.c |
|
| 29 |
-@@ -12930,6 +12930,24 @@ static netdev_features_t bnx2x_features_check(struct sk_buff *skb, |
|
| 30 |
- struct net_device *dev, |
|
| 31 |
- netdev_features_t features) |
|
| 32 |
- {
|
|
| 33 |
-+ /* |
|
| 34 |
-+ * A skb with gso_size + header length > 9700 will cause a |
|
| 35 |
-+ * firmware panic. Drop GSO support. |
|
| 36 |
-+ * |
|
| 37 |
-+ * Eventually the upper layer should not pass these packets down. |
|
| 38 |
-+ * |
|
| 39 |
-+ * For speed, if the gso_size is <= 9000, assume there will |
|
| 40 |
-+ * not be 700 bytes of headers and pass it through. Only do a |
|
| 41 |
-+ * full (slow) validation if the gso_size is > 9000. |
|
| 42 |
-+ * |
|
| 43 |
-+ * (Due to the way SKB_BY_FRAGS works this will also do a full |
|
| 44 |
-+ * validation in that case.) |
|
| 45 |
-+ */ |
|
| 46 |
-+ if (unlikely(skb_is_gso(skb) && |
|
| 47 |
-+ (skb_shinfo(skb)->gso_size > 9000) && |
|
| 48 |
-+ !skb_gso_validate_mac_len(skb, 9700))) |
|
| 49 |
-+ features &= ~NETIF_F_GSO_MASK; |
|
| 50 |
-+ |
|
| 51 |
- features = vlan_features_check(skb, features); |
|
| 52 |
- return vxlan_features_check(skb, features); |
|
| 53 |
- } |
|
| 54 |
-2.7.4 |
|
| 55 |
- |
| ... | ... |
@@ -1,15 +1,15 @@ |
| 1 | 1 |
%global security_hardening none |
| 2 | 2 |
Summary: Kernel |
| 3 | 3 |
Name: linux-aws |
| 4 |
-Version: 4.9.154 |
|
| 5 |
-Release: 3%{?kat_build:.%kat_build}%{?dist}
|
|
| 4 |
+Version: 4.9.163 |
|
| 5 |
+Release: 1%{?kat_build:.%kat_build}%{?dist}
|
|
| 6 | 6 |
License: GPLv2 |
| 7 | 7 |
URL: http://www.kernel.org/ |
| 8 | 8 |
Group: System Environment/Kernel |
| 9 | 9 |
Vendor: VMware, Inc. |
| 10 | 10 |
Distribution: Photon |
| 11 | 11 |
Source0: http://www.kernel.org/pub/linux/kernel/v4.x/linux-%{version}.tar.xz
|
| 12 |
-%define sha1 linux=1a506bd238df9dbdc81e6b74abc0bb751a45eb5b |
|
| 12 |
+%define sha1 linux=8c716f0109f819a1e361853631ff885994c6b1d9 |
|
| 13 | 13 |
Source1: config-aws |
| 14 | 14 |
Source2: initramfs.trigger |
| 15 | 15 |
# common |
| ... | ... |
@@ -47,9 +47,6 @@ Patch30: vmxnet3-avoid-xmit-reset-due-to-a-race-in-vmxnet3.patch |
| 47 | 47 |
Patch31: vmxnet3-use-correct-flag-to-indicate-LRO-feature.patch |
| 48 | 48 |
Patch32: netfilter-ipset-pernet-ops-must-be-unregistered-last.patch |
| 49 | 49 |
Patch33: vmxnet3-fix-incorrect-dereference-when-rxvlan-is-disabled.patch |
| 50 |
-# Fixes for CVE-2018-1000026 |
|
| 51 |
-Patch34: 0001-net-create-skb_gso_validate_mac_len.patch |
|
| 52 |
-Patch35: 0002-bnx2x-disable-GSO-where-gso_size-is-too-big-for-hard.patch |
|
| 53 | 50 |
# Fix for CVE-2018-8043 |
| 54 | 51 |
Patch38: 0001-net-phy-mdio-bcm-unimac-fix-potential-NULL-dereferen.patch |
| 55 | 52 |
Patch42: 0001-hwrng-rdrand-Add-RNG-driver-based-on-x86-rdrand-inst.patch |
| ... | ... |
@@ -220,8 +217,6 @@ This package contains the 'perf' performance analysis tools for Linux kernel. |
| 220 | 220 |
%patch31 -p1 |
| 221 | 221 |
%patch32 -p1 |
| 222 | 222 |
%patch33 -p1 |
| 223 |
-%patch34 -p1 |
|
| 224 |
-%patch35 -p1 |
|
| 225 | 223 |
%patch38 -p1 |
| 226 | 224 |
%patch42 -p1 |
| 227 | 225 |
%patch43 -p1 |
| ... | ... |
@@ -440,6 +435,8 @@ ln -sf %{name}-%{uname_r}.cfg /boot/photon.cfg
|
| 440 | 440 |
/usr/share/doc/* |
| 441 | 441 |
|
| 442 | 442 |
%changelog |
| 443 |
+* Thu Mar 14 2019 Srivatsa S. Bhat (VMware) <srivatsa@csail.mit.edu> 4.9.163-1 |
|
| 444 |
+- Update to version 4.9.163 |
|
| 443 | 445 |
* Mon Feb 25 2019 Ajay Kaher <akaher@vmware.com> 4.9.154-3 |
| 444 | 446 |
- Fix CVE-2018-16882 |
| 445 | 447 |
* Thu Feb 21 2019 Him Kalyan Bordoloi <bordoloih@vmware.com> 4.9.154-2 |
| ... | ... |
@@ -1,15 +1,15 @@ |
| 1 | 1 |
%global security_hardening none |
| 2 | 2 |
Summary: Kernel |
| 3 | 3 |
Name: linux-esx |
| 4 |
-Version: 4.9.154 |
|
| 5 |
-Release: 2%{?dist}
|
|
| 4 |
+Version: 4.9.163 |
|
| 5 |
+Release: 1%{?dist}
|
|
| 6 | 6 |
License: GPLv2 |
| 7 | 7 |
URL: http://www.kernel.org/ |
| 8 | 8 |
Group: System Environment/Kernel |
| 9 | 9 |
Vendor: VMware, Inc. |
| 10 | 10 |
Distribution: Photon |
| 11 | 11 |
Source0: http://www.kernel.org/pub/linux/kernel/v4.x/linux-%{version}.tar.xz
|
| 12 |
-%define sha1 linux=1a506bd238df9dbdc81e6b74abc0bb751a45eb5b |
|
| 12 |
+%define sha1 linux=8c716f0109f819a1e361853631ff885994c6b1d9 |
|
| 13 | 13 |
Source1: config-esx |
| 14 | 14 |
Source2: initramfs.trigger |
| 15 | 15 |
# common |
| ... | ... |
@@ -43,9 +43,6 @@ Patch30: vmxnet3-avoid-xmit-reset-due-to-a-race-in-vmxnet3.patch |
| 43 | 43 |
Patch31: vmxnet3-use-correct-flag-to-indicate-LRO-feature.patch |
| 44 | 44 |
Patch32: netfilter-ipset-pernet-ops-must-be-unregistered-last.patch |
| 45 | 45 |
Patch33: vmxnet3-fix-incorrect-dereference-when-rxvlan-is-disabled.patch |
| 46 |
-# Fixes for CVE-2018-1000026 |
|
| 47 |
-Patch34: 0001-net-create-skb_gso_validate_mac_len.patch |
|
| 48 |
-Patch35: 0002-bnx2x-disable-GSO-where-gso_size-is-too-big-for-hard.patch |
|
| 49 | 46 |
# Fix for CVE-2018-8043 |
| 50 | 47 |
Patch38: 0001-net-phy-mdio-bcm-unimac-fix-potential-NULL-dereferen.patch |
| 51 | 48 |
Patch42: 0001-hwrng-rdrand-Add-RNG-driver-based-on-x86-rdrand-inst.patch |
| ... | ... |
@@ -125,8 +122,6 @@ The Linux package contains the Linux kernel doc files |
| 125 | 125 |
%patch31 -p1 |
| 126 | 126 |
%patch32 -p1 |
| 127 | 127 |
%patch33 -p1 |
| 128 |
-%patch34 -p1 |
|
| 129 |
-%patch35 -p1 |
|
| 130 | 128 |
%patch38 -p1 |
| 131 | 129 |
%patch42 -p1 |
| 132 | 130 |
%patch43 -p1 |
| ... | ... |
@@ -229,6 +224,8 @@ ln -sf linux-%{uname_r}.cfg /boot/photon.cfg
|
| 229 | 229 |
/usr/src/linux-headers-%{uname_r}
|
| 230 | 230 |
|
| 231 | 231 |
%changelog |
| 232 |
+* Thu Mar 14 2019 Srivatsa S. Bhat (VMware) <srivatsa@csail.mit.edu> 4.9.163-1 |
|
| 233 |
+- Update to version 4.9.163 |
|
| 232 | 234 |
* Thu Feb 21 2019 Him Kalyan Bordoloi <bordoloih@vmware.com> 4.9.154-2 |
| 233 | 235 |
- Fix CVE-2019-8912 |
| 234 | 236 |
* Mon Feb 04 2019 Ajay Kaher <akaher@vmware.com> 4.9.154-1 |
| ... | ... |
@@ -1,15 +1,15 @@ |
| 1 | 1 |
%global security_hardening none |
| 2 | 2 |
Summary: Kernel |
| 3 | 3 |
Name: linux-secure |
| 4 |
-Version: 4.9.154 |
|
| 5 |
-Release: 3%{?kat_build:.%kat_build}%{?dist}
|
|
| 4 |
+Version: 4.9.163 |
|
| 5 |
+Release: 1%{?kat_build:.%kat_build}%{?dist}
|
|
| 6 | 6 |
License: GPLv2 |
| 7 | 7 |
URL: http://www.kernel.org/ |
| 8 | 8 |
Group: System Environment/Kernel |
| 9 | 9 |
Vendor: VMware, Inc. |
| 10 | 10 |
Distribution: Photon |
| 11 | 11 |
Source0: http://www.kernel.org/pub/linux/kernel/v4.x/linux-%{version}.tar.xz
|
| 12 |
-%define sha1 linux=1a506bd238df9dbdc81e6b74abc0bb751a45eb5b |
|
| 12 |
+%define sha1 linux=8c716f0109f819a1e361853631ff885994c6b1d9 |
|
| 13 | 13 |
Source1: config-secure |
| 14 | 14 |
Source2: aufs4.9.tar.gz |
| 15 | 15 |
%define sha1 aufs=ebe716ce4b638a3772c7cd3161abbfe11d584906 |
| ... | ... |
@@ -53,9 +53,6 @@ Patch32: vmxnet3-avoid-xmit-reset-due-to-a-race-in-vmxnet3.patch |
| 53 | 53 |
Patch33: vmxnet3-use-correct-flag-to-indicate-LRO-feature.patch |
| 54 | 54 |
Patch34: netfilter-ipset-pernet-ops-must-be-unregistered-last.patch |
| 55 | 55 |
Patch35: vmxnet3-fix-incorrect-dereference-when-rxvlan-is-disabled.patch |
| 56 |
-# Fixes for CVE-2018-1000026 |
|
| 57 |
-Patch36: 0001-net-create-skb_gso_validate_mac_len.patch |
|
| 58 |
-Patch37: 0002-bnx2x-disable-GSO-where-gso_size-is-too-big-for-hard.patch |
|
| 59 | 56 |
# Fix for CVE-2018-8043 |
| 60 | 57 |
Patch40: 0001-net-phy-mdio-bcm-unimac-fix-potential-NULL-dereferen.patch |
| 61 | 58 |
Patch44: 0001-hwrng-rdrand-Add-RNG-driver-based-on-x86-rdrand-inst.patch |
| ... | ... |
@@ -186,8 +183,6 @@ EOF |
| 186 | 186 |
%patch33 -p1 |
| 187 | 187 |
%patch34 -p1 |
| 188 | 188 |
%patch35 -p1 |
| 189 |
-%patch36 -p1 |
|
| 190 |
-%patch37 -p1 |
|
| 191 | 189 |
%patch40 -p1 |
| 192 | 190 |
%patch44 -p1 |
| 193 | 191 |
%patch45 -p1 |
| ... | ... |
@@ -330,6 +325,8 @@ ln -sf linux-%{uname_r}.cfg /boot/photon.cfg
|
| 330 | 330 |
/usr/src/linux-headers-%{uname_r}
|
| 331 | 331 |
|
| 332 | 332 |
%changelog |
| 333 |
+* Thu Mar 14 2019 Srivatsa S. Bhat (VMware) <srivatsa@csail.mit.edu> 4.9.163-1 |
|
| 334 |
+- Update to version 4.9.163 |
|
| 333 | 335 |
* Mon Feb 25 2019 Ajay Kaher <akaher@vmware.com> 4.9.154-3 |
| 334 | 336 |
- Fix CVE-2018-16882 |
| 335 | 337 |
* Thu Feb 21 2019 Him Kalyan Bordoloi <bordoloih@vmware.com> 4.9.154-2 |
| ... | ... |
@@ -1,15 +1,15 @@ |
| 1 | 1 |
%global security_hardening none |
| 2 | 2 |
Summary: Kernel |
| 3 | 3 |
Name: linux |
| 4 |
-Version: 4.9.154 |
|
| 5 |
-Release: 3%{?kat_build:.%kat_build}%{?dist}
|
|
| 4 |
+Version: 4.9.163 |
|
| 5 |
+Release: 1%{?kat_build:.%kat_build}%{?dist}
|
|
| 6 | 6 |
License: GPLv2 |
| 7 | 7 |
URL: http://www.kernel.org/ |
| 8 | 8 |
Group: System Environment/Kernel |
| 9 | 9 |
Vendor: VMware, Inc. |
| 10 | 10 |
Distribution: Photon |
| 11 | 11 |
Source0: http://www.kernel.org/pub/linux/kernel/v4.x/linux-%{version}.tar.xz
|
| 12 |
-%define sha1 linux=1a506bd238df9dbdc81e6b74abc0bb751a45eb5b |
|
| 12 |
+%define sha1 linux=8c716f0109f819a1e361853631ff885994c6b1d9 |
|
| 13 | 13 |
Source1: config |
| 14 | 14 |
Source2: initramfs.trigger |
| 15 | 15 |
%define ena_version 1.1.3 |
| ... | ... |
@@ -51,9 +51,6 @@ Patch31: vmxnet3-use-correct-flag-to-indicate-LRO-feature.patch |
| 51 | 51 |
# To fix kernel PANIC in cascade |
| 52 | 52 |
Patch32: netfilter-ipset-pernet-ops-must-be-unregistered-last.patch |
| 53 | 53 |
Patch33: vmxnet3-fix-incorrect-dereference-when-rxvlan-is-disabled.patch |
| 54 |
-# Fixes for CVE-2018-1000026 |
|
| 55 |
-Patch34: 0001-net-create-skb_gso_validate_mac_len.patch |
|
| 56 |
-Patch35: 0002-bnx2x-disable-GSO-where-gso_size-is-too-big-for-hard.patch |
|
| 57 | 54 |
# Fix for CVE-2018-8043 |
| 58 | 55 |
Patch38: 0001-net-phy-mdio-bcm-unimac-fix-potential-NULL-dereferen.patch |
| 59 | 56 |
|
| ... | ... |
@@ -187,8 +184,6 @@ This package contains the 'perf' performance analysis tools for Linux kernel. |
| 187 | 187 |
%patch31 -p1 |
| 188 | 188 |
%patch32 -p1 |
| 189 | 189 |
%patch33 -p1 |
| 190 |
-%patch34 -p1 |
|
| 191 |
-%patch35 -p1 |
|
| 192 | 190 |
%patch38 -p1 |
| 193 | 191 |
%patch42 -p1 |
| 194 | 192 |
%patch43 -p1 |
| ... | ... |
@@ -378,6 +373,8 @@ ln -sf %{name}-%{uname_r}.cfg /boot/photon.cfg
|
| 378 | 378 |
/usr/share/doc/* |
| 379 | 379 |
|
| 380 | 380 |
%changelog |
| 381 |
+* Thu Mar 14 2019 Srivatsa S. Bhat (VMware) <srivatsa@csail.mit.edu> 4.9.163-1 |
|
| 382 |
+- Update to version 4.9.163 |
|
| 381 | 383 |
* Mon Feb 25 2019 Ajay Kaher <akaher@vmware.com> 4.9.154-3 |
| 382 | 384 |
- Fix CVE-2018-16882 |
| 383 | 385 |
* Thu Feb 21 2019 Him Kalyan Bordoloi <bordoloih@vmware.com> 4.9.154-2 |